Advertisement

A Model of a Malware Infected Automated Guided Vehicle for Experimental Cyber-Physical Security

  • Richard FrenchEmail author
  • Viktoriya Degeler
  • Kevin Jones
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 16)

Abstract

As part of a factory’s manufacturing cycle, materials need to move through a sequence of operations provided by work-cells, eventually culminating in the finished product. To facilitate this, the collection and delivery of materials around a factory environment is often provided by a fleet of Automated Guided Vehicles and results in increased reliability and reduced operating costs. However, if malware is able to get into the system via a deliberate cyber attack on the site or indeed by way of an infected portable data storage device and human error, then the AGV system is potentially at risk of disruption. As part of the exploration of this growing problem space new tools are needed to assist with developing counter strategies towards blocking such cyber-borne industrial sabotage. This article describes one such qualitative research tool we have developed as part of ongoing research into protecting industrial processes from cyber attack.

Keywords

Cyber attack Malware Manufacturing Robotics 

References

  1. 1.
    Schulze, L., Behling, S., Buhrs, S.: Automated guided vehicle systems: a driver for increased business performance. In: Proceedings of International Multi Conference of Engineers and Computer Scientists 2008 (IMECS 2008), pp. 1275–1280 (2008)Google Scholar
  2. 2.
    Gent, E.: Successful hacks and cyber attacks commonly result of human error. In: Engineering and Technology Magazine, April 2015. http://eandt.theiet.org/news/2015/apr/threat-reports.cfm
  3. 3.
    Ackerman, E.: Chinese unmanned factory replaces 600 humans with 60 robots. In: IEEE Spectrum Magazine, August 2015. http://spectrum.ieee.org/automaton/robotics/industrial-robots/chinese-unmanned-factory-replaces-humans-with-robots
  4. 4.
    Nehmzow, U.: Mobile Robotics: A Practical Introduction. Springer, London (2003)CrossRefzbMATHGoogle Scholar
  5. 5.
    Brooks, R.A.: Elephants don’t play chess. Robot. Auton. Syst. 6, 3–15 (1990)CrossRefGoogle Scholar
  6. 6.
    Le-Anh, T., Koster, M.D.: A review of design and control of automated guided vehicle systems. Eur. J. Oper. Res. 171(1), 1–23 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Rosandich, R.G., Lindeke, R.R., Berg, J.: Developing an automatic guided vehicle for small to medium sized enterprises. In: Progress in Material Handling Research, pp. 461–470 (2002)Google Scholar
  8. 8.
    Chen, Z., Member, S., Ji, C.: Spatial-temporal modeling of malware propagation in networks. IEEE Trans. Neural Netw. 16, 1291–1303 (2005)CrossRefGoogle Scholar
  9. 9.
    Garetto, M., Gong, W.: Modeling malware spreading dynamics. In: Proceedings of IEEE INFOCOM, pp. 1869–1879 (2003)Google Scholar
  10. 10.
    Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)Google Scholar
  11. 11.
    Sharma, M.: Control classification of automated vehicle systems. Int. J. Eng. Adv. Technol. (IJEAT) 2, 191–196 (2012)Google Scholar
  12. 12.
    Schneier, M., Bostelman, R., N.I. of Standards, T.U.E.L.I.S. Division: Literature review of mobile robots for manufacturing (2015). https://books.google.co.uk/books?id=_BgFjwEACAAJ
  13. 13.
    Yaghoubi, S., Khalili, S., Nezhad, R.M., Kazemi, M.R., Sakhaiifar, M.R.: Designing and methodology of automated guided vehicle robots/self guided vehicles systems, future trends. Int. J. Res. Rev. Appl. Sci. 13, 340–345 (2012)Google Scholar
  14. 14.
    Brooks, R.A.: A robust layered control system for a mobile robot. IEEE J. Robot. Autom. 2(1), 14–23 (1986)CrossRefGoogle Scholar
  15. 15.
    Dewdney, A.K.: The New Turing Omnibus. Palgrave Macmillan, London (2003)zbMATHGoogle Scholar
  16. 16.
    Morris, T.H., Gao, W.: Industrial control system cyber attacks. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research (2013)Google Scholar
  17. 17.
    Harley, D., Slade, R., Gattiker, U.E.: Viruses Revealed. Osbourne/McGraw-Hill, New York (2001)Google Scholar
  18. 18.
    Kernighan, B.W., Ritchie, D.M.: The C Programming Language, 2nd edn. Prentice Hall, Englewood Cliffs (1988)zbMATHGoogle Scholar
  19. 19.
    Degeler, V., French, R., Jones, K.: Combined danger signal and anomaly-based threat detection in cyber-physical systems. In: 2nd EAI International Conference on Safety and Security in Internet of Things (SaSeIoT). EAI (2015)Google Scholar
  20. 20.
    Wilson, J., Henriksen, J., Roberts, S. (eds.): Modeling AGV systems (1986)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Richard French
    • 1
    Email author
  • Viktoriya Degeler
    • 1
  • Kevin Jones
    • 1
  1. 1.Airbus Group InnovationsNewportUK

Personalised recommendations